Separating Logs for RBAC

%3CLINGO-SUB%20id%3D%22lingo-sub-1315728%22%20slang%3D%22en-US%22%3ESeparating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1315728%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'm%20in%20the%20process%20of%20setting%20up%20Sentinel%20with%20a%20number%20of%20log%20sources%20being%20sent%20via%20CEF.%20It%20appears%20that%20all%20the%20logs%20will%20go%20into%20the%20CommonSecurityEvents%20table%20which%20I%20need%20to%20separate%20out.%20Ideally%20I'd%20like%20to%20maintain%20a%20single%20Log%20Analytics%20workspace%20and%20have%20separate%20tables%20for%20each%20source%20(VPN%2FFirewall%2CWebGW%20etc)%20so%20I%20can%20grant%20each%20team%20access%20to%20the%20tables%20they%20need%20to%20query.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20a%20way%20to%20have%20the%20CEF%20events%20from%20a%20specific%20on-prem%20collector%20write%20to%20a%20specific%20table%3F%20Or%20is%20there%20a%20better%20to%20be%20separating%20out%20these%20log%20sources%20in%20the%20same%20workspace%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1319861%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1319861%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20seperate%20to%20differnt%20tables%20you%20will%20need%20to%20use%20Logstach%20as%20outlined%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Sentinel%2FAzure-Sentinel-Creating-Custom-Connectors%2Fba-p%2F864060%22%20target%3D%22_self%22%3Ehere%3C%2FA%3E.%20That%20said%2C%20you%20can%20use%20resource%20RBAC%20as%20outlined%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fcontrolling-access-to-azure-sentinel-data-resource-rbac%2Fba-p%2F1301463%22%20target%3D%22_self%22%3Ehere%3C%2FA%3E%20with%20a%20single%20table.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E~%20Ofer%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1321040%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1321040%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3B%26nbsp%3Bthanks%20for%20this%2C%20I'd%20rather%20not%20deploy%20LogStash%20if%20I%20don't%20have%20to%2C%20the%20only%20reason%20for%20separate%20table%20would%20be%20if%20I%20couldn't%20split%20the%20logs%20in%20any%20other%20way%2C%20but%20it%20looks%20like%20resource%20RBAC%20might%20work%20for%20us.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBased%20on%20what%20I've%20read%20from%20you%20link%2C%20I'd%20need%20a%20separate%20collector%20VM%20for%20each%20access%20boundary.%20For%20example%20if%20both%20the%20firewall%20and%20web%20proxy%20logs%20will%20only%20be%20accessed%20by%20the%20Network%20team%20then%20I'll%20send%20them%20via%20the%20same%20Collector%20VM.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20a%20way%20to%20set%20the%20resource%20ID%20on%20an%20on-prem%20collector%20without%20using%20Azure%20Arc%3F%20I'd%20like%20to%20get%20up%20and%20running%20with%20this%20and%20while%20Arc%20maybe%20a%20long%20term%20solution%20for%20us%20if%20I%20can%20test%20without%20it%20that%20would%20be%20great.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESimon%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1321085%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1321085%22%20slang%3D%22en-US%22%3EThe%20easiest%20way%20to%20get%20started%20is%20to%20view%20the%20activity%20logs%20with%20the%20Azure%20portal.%20The%20following%20screenshot%20shows%20an%20example%20of%20role%20assignment%20operations%20in%20the%20activity%20log.%20It%20also%20includes%20an%20option%20to%20download%20the%20logs%20as%20a%20CSV%20file.%3CBR%20%2F%3E%3CBR%20%2F%3EActivity%20logs%20using%20the%20portal%20-%20screenshot%3CBR%20%2F%3E%3CBR%20%2F%3EThe%20activity%20log%20in%20the%20portal%20has%20several%20filters.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1321258%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1321258%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%26nbsp%3B%3A%20You%20got%20things%20right.%20No%20options%20I%20am%20aware%20of%20not%20listed%20in%20the%20blog%20post.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1325139%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1325139%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3BThanks%20for%20this%2C%20I'm%20just%20sorting%20out%20Arc%20now.%20My%20plan%20currently%20is%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1)%20Install%20Arc%20on%20Collector1%20and%20grant%20the%20NetOps%20group%20Log%20Analytics%20Reader%20access%20to%20the%20resource%20in%20Azure.%3C%2FP%3E%3CP%3E2)%20Push%20logs%20via%20syslog%20to%20Collector1%3C%2FP%3E%3CP%3E3)%20SecOps%20will%20be%20able%20to%20query%20logs%20via%20Sentinel%20along%20with%20everything%20else%3C%2FP%3E%3CP%3E4)%20NetOps%20will%20be%20able%20to%20query%20logs%20sent%20by%20Collector1%20using%20Azure%20Monitor%2C%20but%20won't%20see%20anything%20else.%20For%20example%20if%20we%20created%20Collector2%20for%20a%20different%20team.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWith%20regards%20to%20the%20access%20would%20you%20grant%20the%20access%20directly%20on%20the%20resource%20or%20do%20you%20think%20it's%20better%20to%20have%20a%20separate%20resource%20group%20for%20the%20team%20so%20they%20can%20add%20Workbooks%20they%20want%20to%20create%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1325160%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1325160%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20not%20immidiately%20of%20importance%2C%20creating%20a%20resource%20group%20adds%20alot%20of%20flexbilty.%20For%20example%20if%20you%20needed%20a%20second%20connector%20VM.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E~%20Ofer%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1335219%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1335219%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3Bthanks%20for%20this%2C%20I've%20decided%20we%20should%20definitely%20use%20Resource%20Groups%20otherwise%20I%20think%20we%20are%20going%20to%20end%20up%20with%20a%20mess%20to%20sort%20out%20later.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI've%20created%20a%20resource%20group%20for%20this%20and%20added%20the%20Collector%20VM%20to%20it%20and%20granted%20my%20test%20user%20Log%20Analytics%20Reader%20and%20Workbook%20Contributor%20to%20the%20groups.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENow%20I%20have%20what%20I%20hope%20is%20a%20really%20simple%20issue%20to%20resolve.%20If%20I%20use%20my%20test%20user%20and%20go%20to%20Azure%20Arc%20I%20can%20see%20and%20search%20logs%20for%20that%20device.%20However%20if%20I%20go%20to%20Monitor%20with%20the%20same%20account%20it%20prompts%20me%20to%20select%20a%20scope%2C%20but%20I%20can't%20see%20anything%20under%20the%20subscription.%20(I%20would%20have%20thought%20I%20would%20see%20the%20resource%20group%20and%20the%20collector%20VM%20under%20that).%20Am%20I%20just%20missing%20a%20permissions%20somewhere%20or%20have%20I%20misunderstood%20how%20this%20will%20all%20work%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20in%20advance.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1339213%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1339213%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%26nbsp%3B%3A%20Reading%20your%20post%2C%20I%20think%20you%20are%20doing%20thing%20right%20and%20I%20am%20not%20sure%20why%20you%20can't%20find%20your%20VM%20in%20the%20scope%20selector.%20Might%20be%20worth%20a%20support%20ticket.%20If%20they%20don't%20help%2C%20I%20can%20try%20to%20have%20you%20work%20with%20the%20Azure%20Arc%20PM%20team%20-%20this%20is%20a%20new%20technology%20and%20maybe%20there%20are%20some%20corner%20cases%20to%20understand.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1339359%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1339359%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%26nbsp%3B%20Do%20you%20also%20have%20the%20standard%20Log%20Analytics%20agent%20installed%20on%20the%20on%20prem%20VM%2C%20or%20just%20Azure%20Arc%20for%20servers%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%22This%20agent%20does%20not%20deliver%20any%20other%20functionality%2C%20and%20it%20doesn't%20replace%20the%20Azure%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Flog-analytics-agent%22%20data-linktype%3D%22relative-path%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELog%20Analytics%20agent%3C%2FA%3E%3CSPAN%3E.%20The%20Log%20Analytics%20agent%20for%20Windows%20and%20Linux%20is%20required%20when%20you%20want%20to%20proactively%20monitor%20the%20OS%20and%20workloads%20running%20on%20the%20machine%2C%20manage%20it%20using%20Automation%20runbooks%20or%20solutions%20like%20Update%20Management%2C%20or%20use%20other%20Azure%20services%20like%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fsecurity-center-intro%22%20data-linktype%3D%22relative-path%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%3C%2FA%3E%3CSPAN%3E.%22%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-arc%2Fservers%2Foverview%23supported-scenarios%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-arc%2Fservers%2Foverview%23supported-scenarios%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1340156%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1340156%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F170596%22%20target%3D%22_blank%22%3E%40Sonia%20Cuff%3C%2FA%3E%26nbsp%3BI%20have%20both%20the%20LA%20agent%20and%20the%20Arc%20agent%20installed%20on%20both%20a%20Windows%20and%20Linux%20box.%20I've%20created%20resource%20groups%20to%20control%20access%20to%20the%20logs%20for%20these%20servers.%20When%20I%20try%20and%20select%20a%20scope%20in%20Monitor%20the%20resource%20groups%20do%20not%20appear%20in%20the%20selection%20list%2C%20although%20others%20do.%20Each%20resource%20group%20currently%20only%20contains%20the%20server%20with%20the%20LA%20and%20ARC%20agents%20on%20and%20my%20(possibly%20incorrect)%20assumption%20what%20that%20would%20allow%20me%20to%20create%20a%20boundary%20for%20access%20to%20the%20logs%20each%20VM%20is%20forwarding%20rather%20than%20have%20everything%20exposed%20to%20the%20user.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1340365%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1340365%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3BHave%20logged%20a%20ticket%2C%20I%20think%20this%20is%20more%20a%20Log%20Analytics%20RBAC%20issue%20than%20Arc%20but%20I'll%20update%20here%20with%20any%20resolution.%20Thanks%20very%20much%20for%20your%20help.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1342152%22%20slang%3D%22en-US%22%3ERe%3A%20Separating%20Logs%20for%20RBAC%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1342152%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255877%22%20target%3D%22_blank%22%3E%40SimonR%3C%2FA%3E%26nbsp%3BThanks%20Simon%20and%20yes%2C%20very%20interested%20in%20the%20result!%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

Hi,

 

I'm in the process of setting up Sentinel with a number of log sources being sent via CEF. It appears that all the logs will go into the CommonSecurityEvents table which I need to separate out. Ideally I'd like to maintain a single Log Analytics workspace and have separate tables for each source (VPN/Firewall,WebGW etc) so I can grant each team access to the tables they need to query.

 

Is there a way to have the CEF events from a specific on-prem collector write to a specific table? Or is there a better to be separating out these log sources in the same workspace?

 

 

12 Replies
Highlighted

@SimonR

 

To seperate to differnt tables you will need to use Logstach as outlined here. That said, you can use resource RBAC as outlined here with a single table.

 

~ Ofer 

Highlighted

@Ofer_Shezaf  thanks for this, I'd rather not deploy LogStash if I don't have to, the only reason for separate table would be if I couldn't split the logs in any other way, but it looks like resource RBAC might work for us.

 

Based on what I've read from you link, I'd need a separate collector VM for each access boundary. For example if both the firewall and web proxy logs will only be accessed by the Network team then I'll send them via the same Collector VM. 

 

Is there a way to set the resource ID on an on-prem collector without using Azure Arc? I'd like to get up and running with this and while Arc maybe a long term solution for us if I can test without it that would be great.

 

Simon

Highlighted
The easiest way to get started is to view the activity logs with the Azure portal. The following screenshot shows an example of role assignment operations in the activity log. It also includes an option to download the logs as a CSV file.

Activity logs using the portal - screenshot

The activity log in the portal has several filters.
Highlighted

@SimonR : You got things right. No options I am aware of not listed in the blog post. 

Highlighted

@Ofer_Shezaf Thanks for this, I'm just sorting out Arc now. My plan currently is:

 

1) Install Arc on Collector1 and grant the NetOps group Log Analytics Reader access to the resource in Azure.

2) Push logs via syslog to Collector1

3) SecOps will be able to query logs via Sentinel along with everything else

4) NetOps will be able to query logs sent by Collector1 using Azure Monitor, but won't see anything else. For example if we created Collector2 for a different team.

 

With regards to the access would you grant the access directly on the resource or do you think it's better to have a separate resource group for the team so they can add Workbooks they want to create?

Highlighted

@SimonR

 

While not immidiately of importance, creating a resource group adds alot of flexbilty. For example if you needed a second connector VM.

 

~ Ofer 

Highlighted

@Ofer_Shezaf thanks for this, I've decided we should definitely use Resource Groups otherwise I think we are going to end up with a mess to sort out later.

 

I've created a resource group for this and added the Collector VM to it and granted my test user Log Analytics Reader and Workbook Contributor to the groups.

 

Now I have what I hope is a really simple issue to resolve. If I use my test user and go to Azure Arc I can see and search logs for that device. However if I go to Monitor with the same account it prompts me to select a scope, but I can't see anything under the subscription. (I would have thought I would see the resource group and the collector VM under that). Am I just missing a permissions somewhere or have I misunderstood how this will all work?

 

Thanks in advance.

Highlighted

@SimonR : Reading your post, I think you are doing thing right and I am not sure why you can't find your VM in the scope selector. Might be worth a support ticket. If they don't help, I can try to have you work with the Azure Arc PM team - this is a new technology and maybe there are some corner cases to understand. 

Highlighted

@SimonR  Do you also have the standard Log Analytics agent installed on the on prem VM, or just Azure Arc for servers? 

 

"This agent does not deliver any other functionality, and it doesn't replace the Azure Log Analytics agent. The Log Analytics agent for Windows and Linux is required when you want to proactively monitor the OS and workloads running on the machine, manage it using Automation runbooks or solutions like Update Management, or use other Azure services like Azure Security Center."

 

https://docs.microsoft.com/en-us/azure/azure-arc/servers/overview#supported-scenarios

Highlighted

@Sonia Cuff I have both the LA agent and the Arc agent installed on both a Windows and Linux box. I've created resource groups to control access to the logs for these servers. When I try and select a scope in Monitor the resource groups do not appear in the selection list, although others do. Each resource group currently only contains the server with the LA and ARC agents on and my (possibly incorrect) assumption what that would allow me to create a boundary for access to the logs each VM is forwarding rather than have everything exposed to the user. 

Highlighted

Thanks @Ofer_Shezaf Have logged a ticket, I think this is more a Log Analytics RBAC issue than Arc but I'll update here with any resolution. Thanks very much for your help.

Highlighted

@SimonR @SimonR Thanks Simon and yes, very interested in the result!